First published: Tue Jul 12 2022(Updated: )
A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver (Enterprise Portal) | =7.30 | |
SAP NetWeaver (Enterprise Portal) | =7.31 | |
SAP NetWeaver (Enterprise Portal) | =7.40 | |
SAP NetWeaver (Enterprise Portal) | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35227 is a high-severity vulnerability due to its potential for remote exploitation via Cross-Site Scripting (XSS).
To fix CVE-2022-35227, users should apply the recommended patches and updates provided by SAP for affected versions of the NetWeaver Enterprise Portal.
CVE-2022-35227 affects SAP NetWeaver Enterprise Portal versions 7.30, 7.31, 7.40, and 7.50.
CVE-2022-35227 allows for Cross-Site Scripting (XSS) attacks, enabling remote attackers to execute arbitrary script code.
Organizations using SAP NetWeaver Enterprise Portal versions 7.30, 7.31, 7.40, or 7.50 are at risk from CVE-2022-35227.